A directory traversal vulnerability in the Captive Portal templates of OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allows attackers to execute arbitrary system commands as root via a crafted ZIP archive.
References
Link | Resource |
---|---|
https://github.com/opnsense/core/commit/448762d440b51574f1906c0ec2f5ea6dc4f16eb2 | Patch |
https://logicaltrust.net/blog/2023/08/opnsense.html | Exploit Third Party Advisory |
https://github.com/opnsense/core/commit/448762d440b51574f1906c0ec2f5ea6dc4f16eb2 | Patch |
https://logicaltrust.net/blog/2023/08/opnsense.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/opnsense/core/commit/448762d440b51574f1906c0ec2f5ea6dc4f16eb2 - Patch | |
References | () https://logicaltrust.net/blog/2023/08/opnsense.html - Exploit, Third Party Advisory | |
Summary |
|
22 Feb 2024, 17:44
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
Information
Published : 2023-08-09 19:15
Updated : 2024-11-21 08:14
NVD link : CVE-2023-38997
Mitre link : CVE-2023-38997
CVE.ORG link : CVE-2023-38997
JSON object : View
Products Affected
opnsense
- opnsense
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')